Syslog collecting software is installed on the server For the log containment, a disk with FAT type partition is used An engineer determined that log files are being corrupted when the 4 GB tile size is exceeded. Which action resolves the issue?
According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?
An engineer needs to have visibility on TCP bandwidth usage, response time, and latency, combined with deep packet inspection to identify unknown software by its network traffic flow. Which two features of Cisco Application Visibility and Control should the engineer use to accomplish this goal? (Choose two.)
Which open-sourced packet capture tool uses Linux and Mac OS X operating systems?
Refer to the exhibit.
Which field contains DNS header information if the payload is a query or a response?
Refer to the exhibit.
A company's user HTTP connection to a malicious site was blocked according to configured policy What is the source technology used for this measure'?
Refer to the exhibit.
What is the potential threat identified in this Stealthwatch dashboard?
An engineer received a flood of phishing emails from HR with the source address HRjacobm@companycom. What is the threat actor in this scenario?
A security engineer notices confidential data being exfiltrated to a domain "Ranso4134-mware31-895" address that is attributed to a known advanced persistent threat group The engineer discovers that the activity is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Cyber Kill Chain?
A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.
Which technology should be used to accomplish this task?
Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
A system administrator is ensuring that specific registry information is accurate.
Which type of configuration information does the HKEY_LOCAL_MACHINE hive contain?
A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers A SOC analyst checked the endpoints and discovered that they are infected and became part of the botnet Endpoints are sending multiple DNS requests but with spoofed IP addresses of valid external sources What kind of attack are infected endpoints involved in1?
Which type of attack occurs when an attacker is successful in eavesdropping on a conversation between two IP phones?
Refer to the exhibit.
A security analyst is investigating unusual activity from an unknown IP address Which type of evidence is this file1?
What are two differences between tampered disk images and untampered disk images'? (Choose two.)
What is a benefit of agent-based protection when compared to agentless protection?
An engineer discovered a breach, identified the threat’s entry point, and removed access. The engineer was able to identify the host, the IP address of the threat actor, and the application the threat actor targeted. What is the next step the engineer should take according to the NIST SP 800-61 Incident handling guide?
A security engineer must investigate a recent breach within the organization. An engineer noticed that a breached workstation is trying to connect to the domain "Ranso4730-mware92-647". which is known as malicious. In which step of the Cyber Kill Chain is this event?
Drag and drop the elements from the left into the correct order for incident handling on the right.
Refer to the exhibit.
An engineer received a ticket about a slowed-down web application. The engineer runs the #netstat -an command. How must the engineer interpret the results?
A security engineer notices confidential data being exfiltrated to a domain "Ranso4134-mware31-895" address that is attributed to a known advanced persistent threat group The engineer discovers that the activity is part of a real attack and not a network misconfiguration. Which category does this event fall under as defined in the Cyber Kill Chain?
At a company party a guest asks questions about the company’s user account format and password complexity. How is this type of conversation classified?
A company receptionist received a threatening call referencing stealing assets and did not take any action assuming it was a social engineering attempt. Within 48 hours, multiple assets were breached, affecting the confidentiality of sensitive information. What is the threat actor in this incident?
Which element is included in an incident response plan as stated m NIST SP800-617
An analyst is exploring the functionality of different operating systems.
What is a feature of Windows Management Instrumentation that must be considered when deciding on an operating system?
An engineer configured regular expression “.”\.(pd][Oo][Cc)|[Xx][LI][Ss]|[Pp][Pp][Tt]) HTTP/1 .[01]" on Cisco ASA firewall. What does this regular expression do?
Which security principle requires more than one person is required to perform a critical task?
An engineer must compare NIST vs ISO frameworks The engineer deeded to compare as readable documentation and also to watch a comparison video review. Using Windows 10 OS. the engineer started a browser and searched for a NIST document and then opened a new tab in the same browser and searched for an ISO document for comparison
The engineer tried to watch the video, but there 'was an audio problem with OS so the engineer had to troubleshoot it At first the engineer started CMD and looked fee a driver path then locked for a corresponding registry in the registry editor The engineer enabled "Audiosrv" in task manager and put it on auto start and the problem was solved Which two components of the OS did the engineer touch? (Choose two)
A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?
Refer to the exhibit. An attacker scanned the server using Nmap. What did the attacker obtain from this scan?
A SOC analyst detected connections to known C&C and port scanning activity to main HR database servers from one of the HR endpoints via Cisco StealthWatch. What are the two next steps of the SOC team according to the NISTSP800-61 incident handling process? (Choose two)
A user reports difficulties accessing certain external web pages. When an engineer examines traffic to and from the external domain in full packet captures, they notice that many SYNs have the same sequence number, source, and destination IP address, but they have different payloads. What is causing this situation?
Which type of attack is a blank email with the subject "price deduction" that contains a malicious attachment?
Why should an engineer use a full packet capture to investigate a security breach?
What is the difference between inline traffic interrogation (TAPS) and traffic mirroring (SPAN)?
Which metric should be used when evaluating the effectiveness and scope of a Security Operations Center?
Which type of verification consists of using tools to compute the message digest of the original and copied data, then comparing the similarity of the digests?
Which type of data consists of connection level, application-specific records generated from network traffic?
What is the difference between indicator of attack (loA) and indicators of compromise (loC)?
During which phase of the forensic process are tools and techniques used to extract information from the collected data?
What is the difference between discretionary access control (DAC) and role-based access control (RBAC)?
An analyst is investigating a host in the network that appears to be communicating to a command and control server on the Internet. After collecting this packet capture, the analyst cannot determine the technique and payload used for the communication.
Which obfuscation technique is the attacker using?
Refer to the exhibit.
This request was sent to a web application server driven by a database. Which type of web server attack is represented?
According to the NIST SP 800-86. which two types of data are considered volatile? (Choose two.)
A threat actor penetrated an organization's network. Using the 5-tuple approach, which data points should the analyst use to isolate the compromised host in a grouped set of logs?
An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?
Refer to the exhibit.
Which packet contains a file that is extractable within Wireshark?
What is the difference between the ACK flag and the RST flag in the NetFlow log session?
Drag and drop the security concept from the left onto the example of that concept on the right.
An organization has recently adjusted its security stance in response to online threats made by a known hacktivist group.
What is the initial event called in the NIST SP800-61?
An engineer needs to discover alive hosts within the 192.168.1.0/24 range without triggering intrusive portscan alerts on the IDS device using Nmap. Which command will accomplish this goal?
Refer to the exhibit.
An attacker gained initial access to the company s network and ran an Nmap scan to advance with the lateral movement technique and to search the sensitive data Which two elements can an attacker identify from the scan? (Choose two.)
A security engineer has a video of a suspect entering a data center that was captured on the same day that files in the same data center were transferred to a competitor.
Which type of evidence is this?
Which type of attack uses a botnet to reflect requests off of an NTP server to overwhelm a target?
Drag and drop the type of evidence from the left onto the description of that evidence on the right.
Which two elements are assets in the role of attribution in an investigation? (Choose two.)
What is the impact of false positive alerts on business compared to true positive?
Which type of data must an engineer capture to analyze payload and header information?
CyberOps Associate | 200-201 Written Exam | 200-201 Questions Answers | 200-201 Test Prep | 200-201 CyberOps Associate Actual Questions | Understanding Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS) Exam Questions PDF | CyberOps Associate Free Questions | 200-201 Online Exam | 200-201 Practice Test | 200-201 PDF | 200-201 CyberOps Associate Dumps | 200-201 Test Questions | 200-201 Study Material | 200-201 Exam Preparation | 200-201 Valid Dumps | 200-201 Real Questions | 200-201 CyberOps Associate Practice Test | CyberOps Associate 200-201 Dumps | Understanding Cisco Cybersecurity Operations Fundamentals (200-201 CBROPS) Exam Questions